Back to the MIT repository
4. Malicious Actors & Misuse2 - Post-deployment

Business operations/infrastructure damage

Business operations/infrastructure damage - Damage, disruption, or destruction of a business system and/or its components due to malfunction, cyberattacks, etc.

Source: MIT AI Risk Repositorymit954

ENTITY

3 - Other

INTENT

3 - Other

TIMING

2 - Post-deployment

Risk ID

mit954

Domain lineage

4. Malicious Actors & Misuse

223 mapped risks

4.2 > Cyberattacks, weapon development or use, and mass harm

Mitigation strategy

1. Formalize and rigorously exercise a Disaster Recovery Plan (DRP) focused on business continuity, ensuring regular, encrypted, and isolated offsite backups of critical data and configurations to enable rapid system reconstitution following an infrastructure compromise 2. Implement a Zero-Trust architecture by employing network segmentation to isolate critical systems and enforce multi-factor authentication (MFA) and the principle of least privilege (PoLP) for all user accounts, thereby limiting lateral movement and mitigating unauthorized access 3. Establish a continuous security monitoring and response capability, utilizing advanced tools such as Endpoint Detection and Response (EDR) and Intrusion Detection Systems (IDS) to proactively detect, contain, and remove malicious activity within the operational environment